CVE-1999-1138: SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp fo
SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable.
AI Analysis
Technical Summary
CVE-1999-1138 is a critical vulnerability affecting SCO UNIX System V/386 Release 3.2 and several related SCO products, including open_desktop versions 1.0 through 3.0 and multiple system_v386 operating system variants. The vulnerability arises from the insecure installation of home directories for specific user accounts: the 'dos' user’s home directory is set to /tmp, and the 'asg' user’s home directory is set to /usr/tmp. Both /tmp and /usr/tmp are world-writable directories, meaning any user on the system can write files there. This misconfiguration allows malicious users to gain unauthorized access to the dos and asg accounts by exploiting the writable nature of these directories. Since these directories are commonly used for temporary file storage and are accessible by all users, an attacker can place malicious files or manipulate files in these directories to escalate privileges or impersonate these accounts. The vulnerability has a CVSS score of 10.0, indicating critical severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and complete impact on confidentiality, integrity, and availability (C:C/I:C/A:C). Despite its age (published in 1993), the vulnerability remains significant for any legacy systems still running these SCO UNIX versions. No patches are available, and no known exploits are currently reported in the wild, but the inherent design flaw poses a severe risk if such systems are accessible within a network environment.
Potential Impact
For European organizations, the impact of this vulnerability is substantial if legacy SCO UNIX System V/386 systems are still in operation, particularly in industrial, governmental, or critical infrastructure environments where such systems might persist. Exploitation could lead to full system compromise, allowing attackers to access sensitive data, disrupt services, or use the compromised systems as footholds for lateral movement within networks. The complete compromise of confidentiality, integrity, and availability could result in data breaches, operational downtime, and loss of trust. Given the lack of patches, organizations face challenges in securing these systems, increasing the risk of exploitation especially in environments where network segmentation or compensating controls are weak or absent. Additionally, the vulnerability’s exploitation does not require authentication or user interaction, making it easier for attackers to leverage if network access is available. This elevates the threat level for European entities that maintain legacy SCO UNIX systems connected to their networks.
Mitigation Recommendations
Since no official patches are available for this vulnerability, European organizations should implement compensating controls to mitigate risk. First, isolate any affected SCO UNIX systems from untrusted networks by implementing strict network segmentation and firewall rules to limit access only to trusted administrators and essential services. Second, restrict user access and monitor usage of the /tmp and /usr/tmp directories, potentially remounting these directories with the 'noexec' and 'nosuid' options to reduce the risk of executing malicious code. Third, consider migrating critical services from vulnerable SCO UNIX systems to modern, supported operating systems to eliminate exposure. Fourth, implement robust intrusion detection and prevention systems (IDS/IPS) to monitor for suspicious activity related to these accounts or directories. Finally, conduct regular audits and access reviews to detect unauthorized access attempts and ensure that legacy systems are only used when absolutely necessary and under strict controls.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands
CVE-1999-1138: SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp fo
Description
SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable.
AI-Powered Analysis
Technical Analysis
CVE-1999-1138 is a critical vulnerability affecting SCO UNIX System V/386 Release 3.2 and several related SCO products, including open_desktop versions 1.0 through 3.0 and multiple system_v386 operating system variants. The vulnerability arises from the insecure installation of home directories for specific user accounts: the 'dos' user’s home directory is set to /tmp, and the 'asg' user’s home directory is set to /usr/tmp. Both /tmp and /usr/tmp are world-writable directories, meaning any user on the system can write files there. This misconfiguration allows malicious users to gain unauthorized access to the dos and asg accounts by exploiting the writable nature of these directories. Since these directories are commonly used for temporary file storage and are accessible by all users, an attacker can place malicious files or manipulate files in these directories to escalate privileges or impersonate these accounts. The vulnerability has a CVSS score of 10.0, indicating critical severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and complete impact on confidentiality, integrity, and availability (C:C/I:C/A:C). Despite its age (published in 1993), the vulnerability remains significant for any legacy systems still running these SCO UNIX versions. No patches are available, and no known exploits are currently reported in the wild, but the inherent design flaw poses a severe risk if such systems are accessible within a network environment.
Potential Impact
For European organizations, the impact of this vulnerability is substantial if legacy SCO UNIX System V/386 systems are still in operation, particularly in industrial, governmental, or critical infrastructure environments where such systems might persist. Exploitation could lead to full system compromise, allowing attackers to access sensitive data, disrupt services, or use the compromised systems as footholds for lateral movement within networks. The complete compromise of confidentiality, integrity, and availability could result in data breaches, operational downtime, and loss of trust. Given the lack of patches, organizations face challenges in securing these systems, increasing the risk of exploitation especially in environments where network segmentation or compensating controls are weak or absent. Additionally, the vulnerability’s exploitation does not require authentication or user interaction, making it easier for attackers to leverage if network access is available. This elevates the threat level for European entities that maintain legacy SCO UNIX systems connected to their networks.
Mitigation Recommendations
Since no official patches are available for this vulnerability, European organizations should implement compensating controls to mitigate risk. First, isolate any affected SCO UNIX systems from untrusted networks by implementing strict network segmentation and firewall rules to limit access only to trusted administrators and essential services. Second, restrict user access and monitor usage of the /tmp and /usr/tmp directories, potentially remounting these directories with the 'noexec' and 'nosuid' options to reduce the risk of executing malicious code. Third, consider migrating critical services from vulnerable SCO UNIX systems to modern, supported operating systems to eliminate exposure. Fourth, implement robust intrusion detection and prevention systems (IDS/IPS) to monitor for suspicious activity related to these accounts or directories. Finally, conduct regular audits and access reviews to detect unauthorized access attempts and ensure that legacy systems are only used when absolutely necessary and under strict controls.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32ab6fd31d6ed7de3fd
Added to database: 5/20/2025, 3:43:38 PM
Last enriched: 7/1/2025, 5:12:46 PM
Last updated: 8/12/2025, 3:56:06 AM
Views: 10
Related Threats
CVE-2025-54187: Out-of-bounds Write (CWE-787) in Adobe Substance3D - Painter
HighCVE-2025-55165: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in gelbphoenix autocaliweb
HighCVE-2025-54226: Use After Free (CWE-416) in Adobe InDesign Desktop
HighCVE-2025-54225: Use After Free (CWE-416) in Adobe InDesign Desktop
HighCVE-2025-54224: Use After Free (CWE-416) in Adobe InDesign Desktop
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.